Skip to content
View ihebski's full-sized avatar
🔥
drunk ! 🍻
🔥
drunk ! 🍻

Block or report ihebski

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ihebski/README.md

Restricted ZONE 👾💀

  • Masks are mandatory here !😷

About me

Security Engineer (⌐■_■) | Pentester/Bughunter @synackRedTeam

Defunding at day 🛡 breaking things at night 👿

umararfeen/ GitHub Ihebski

trophy

Pinned Loading

  1. DefaultCreds-cheat-sheet Public

    One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️

    Python 6.1k 728

  2. A-Red-Teamer-diaries Public

    RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.

    1.8k 305

  3. XSS-Payloads Public

    Collection of XSS Payloads for fun and profit

    177 62

  4. db Public

    Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]

    Python 29 6

  5. rs Public

    Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp

    Python 41 22

  6. CVE-2024-3400 Public

    CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect

    29 4

ihebski (Ihebski) · GitHub
Skip to content
View ihebski's full-sized avatar
🔥
drunk ! 🍻
🔥
drunk ! 🍻

Block or report ihebski

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ihebski/README.md

Restricted ZONE 👾💀

  • Masks are mandatory here !😷

About me

Security Engineer (⌐■_■) | Pentester/Bughunter @synackRedTeam

Defunding at day 🛡 breaking things at night 👿

umararfeen/ GitHub Ihebski

trophy

Pinned Loading

  1. DefaultCreds-cheat-sheet Public

    One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️

    Python 6.1k 728

  2. A-Red-Teamer-diaries Public

    RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.

    1.8k 305

  3. XSS-Payloads Public

    Collection of XSS Payloads for fun and profit

    177 62

  4. db Public

    Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]

    Python 29 6

  5. rs Public

    Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp

    Python 41 22

  6. CVE-2024-3400 Public

    CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect

    29 4

ihebski (Ihebski) · GitHub
Skip to content
View ihebski's full-sized avatar
🔥
drunk ! 🍻
🔥
drunk ! 🍻

Block or report ihebski

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ihebski/README.md

Restricted ZONE 👾💀

  • Masks are mandatory here !😷

About me

Security Engineer (⌐■_■) | Pentester/Bughunter @synackRedTeam

Defunding at day 🛡 breaking things at night 👿

umararfeen/ GitHub Ihebski

trophy

Pinned Loading

  1. DefaultCreds-cheat-sheet Public

    One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️

    Python 6.1k 728

  2. A-Red-Teamer-diaries Public

    RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.

    1.8k 305

  3. XSS-Payloads Public

    Collection of XSS Payloads for fun and profit

    177 62

  4. db Public

    Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]

    Python 29 6

  5. rs Public

    Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp

    Python 41 22

  6. CVE-2024-3400 Public

    CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect

    29 4